/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_i.h | 52 * If the peer was discovered based on an interface address (e.g., GO 58 * address of the peer. 155 u8 peer[ETH_ALEN]; member in struct:p2p_sd_query 218 * P2P_WAIT_PEER_CONNECT - Waiting peer in List for GO Neg 223 * P2P_WAIT_PEER_IDLE - Waiting peer idle for GO Neg 274 * go_neg_peer - Pointer to GO Negotiation peer 279 * invite_peer - Pointer to Invite peer 284 * last_p2p_find_oper - Pointer to last pre-find operation peer 296 * sd_peer - Pointer to Service Discovery peer 312 * sd_query_no_ack - The first peer (De [all...] |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ 65 /* Use WSD only if the peer indicates support or it */ 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 295 " due to it being the first no-ACK peer in this search iteration", 443 * separately for each peer to avoid having to drop old 882 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/boringssl/src/ssl/ |
H A D | ssl_lib.cc | 1133 // time out because the peer never received our close_notify. Report to 1988 int SSL_select_next_proto(uint8_t **out, uint8_t *out_len, const uint8_t *peer, argument 1994 // For each protocol in peer preference order, see if we support it. 1997 if (peer[i] == supported[j] && 1998 OPENSSL_memcmp(&peer[i + 1], &supported[j + 1], peer[i]) == 0) { 2000 result = &peer[i]; 2007 i += peer[i]; 2011 // There's no overlap between our protocols and the peer's list.
|
/external/syslinux/gpxe/src/net/tcp/ |
H A D | iscsi.c | 1504 struct sockaddr *peer; local 1514 peer = va_arg ( tmp, struct sockaddr * ); 1515 memcpy ( &iscsi->target_sockaddr, peer,
|
/external/boringssl/include/openssl/ |
H A D | evp.h | 590 // EVP_PKEY_derive_set_peer sets the peer's key to be used for key derivation 591 // by |ctx| to |peer|. It should be called after |EVP_PKEY_derive_init|. (For 592 // example, this is used to set the peer's key in (EC)DH.) It returns one on 594 OPENSSL_EXPORT int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer);
|
/external/boringssl/src/include/openssl/ |
H A D | evp.h | 590 // EVP_PKEY_derive_set_peer sets the peer's key to be used for key derivation 591 // by |ctx| to |peer|. It should be called after |EVP_PKEY_derive_init|. (For 592 // example, this is used to set the peer's key in (EC)DH.) It returns one on 594 OPENSSL_EXPORT int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer);
|
/external/iw/ |
H A D | interface.c | 553 COMMAND(set, peer, "<MAC address>", 555 "Set interface WDS peer.");
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_drv_ops.h | 125 enum wnm_oper oper, const u8 *peer,
|
H A D | ap_drv_ops.c | 707 const u8 *peer, u8 *buf, u16 *buf_len) 711 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 706 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.h | 63 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_drv_ops.h | 125 enum wnm_oper oper, const u8 *peer,
|
H A D | ap_drv_ops.c | 707 const u8 *peer, u8 *buf, u16 *buf_len) 711 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 706 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.h | 63 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | events.c | 3176 wpa_tdls_remove(wpa_s->wpa, data->tdls.peer); 3178 wpa_tdls_start(wpa_s->wpa, data->tdls.peer); 3180 wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, data->tdls.peer); 3184 wpa_tdls_teardown_link(wpa_s->wpa, data->tdls.peer, 3188 data->tdls.peer); 3192 data->tdls.peer); 3253 ibss_rsn_start(wpa_s->ibss_rsn, data->ibss_rsn_start.peer); 4439 ibss_rsn_stop(wpa_s->ibss_rsn, data->ibss_peer_lost.peer); 4509 wpa_mesh_notify_peer(wpa_s, data->mesh_peer.peer,
|
H A D | p2p_supplicant.h | 155 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_drv_ops.h | 125 enum wnm_oper oper, const u8 *peer,
|
H A D | ap_drv_ops.c | 707 const u8 *peer, u8 *buf, u16 *buf_len) 711 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 706 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.h | 63 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
|
/external/python/cpython2/Lib/ |
H A D | ftplib.py | 844 def parse229(resp, peer): 861 host = peer[0]
|
/external/python/cpython3/Lib/ |
H A D | ftplib.py | 857 def parse229(resp, peer): 874 host = peer[0]
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_privsep.c | 393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN);
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ 65 /* Use WSD only if the peer indicates support or it */ 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 295 " due to it being the first no-ACK peer in this search iteration", 443 * separately for each peer to avoid having to drop old 882 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_privsep.c | 393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN);
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ 65 /* Use WSD only if the peer indicates support or it */ 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 295 " due to it being the first no-ACK peer in this search iteration", 443 * separately for each peer to avoid having to drop old 882 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_privsep.c | 393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN);
|